Skip to main content
  • Conference proceedings
  • © 2000

Public Key Cryptography

Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1751)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

  2. An Efficient NICE-Schnorr-Type Signature Scheme

    • Detlef Hühnlein, Johannes Merkle
    Pages 14-27
  3. Identification of Bad Signatures in Batches

    • Jaroslaw Pastuszak, Dariusz Michałek, Josef Pieprzyk, Jennifer Seberry
    Pages 28-45
  4. Some Remarks on a Fair Exchange Protocol

    • Jianying Zhou, Robert Deng, Feng Bao
    Pages 46-57
  5. Gaudry’s Variant against C ab Curves

    • Seigo Arita
    Pages 58-67
  6. An Identification Scheme Based on Sparse Polynomials

    • William D. Banks, Daniel Lieman, Igor E. Shparlinski
    Pages 68-74
  7. A State-Based Model for Certificate Management Systems

    • Chuchang Liu, Maris A. Ozols, Marie Henderson, Tony Cant
    Pages 75-92
  8. Short Proofs of Knowledge for Factoring

    • Guillaume Poupard, Jacques Stern
    Pages 147-166
  9. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms

    • X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, H. W. Chan
    Pages 167-177
  10. All-or-Nothing Transform and Remotely Keyed Encryption Protocols

    • Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    Pages 178-195
  11. Security of Public Key Certificate Based Authentication Protocols

    • Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Pages 196-209
  12. Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2

    • Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Pages 210-222
  13. Key Recovery in Third Generation Wireless Communication Systems

    • Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Pages 223-237
  14. Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications

    • Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Pages 238-257
  15. Design Validations for Discrete Logarithm Based Signature Schemes

    • Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Pages 276-292

Editors and Affiliations

  • National Institute of Advanced Industrial Science and Technology (AIST), Research Center for Information Security (RCIS),  

    Hideki Imai

  • Department of Software & Information Systems, The University of North Carolina at Charlotte, Charlotte, USA

    Yuliang Zheng

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access